On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (containing credentials) is not correctly checked. An attacker can bypass authentication by providing an empty loginuse parameter and an empty loginpas parameter in the URI.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T03:08:33.720Z
Reserved: 2017-04-25T00:00:00Z
Link: CVE-2017-8225

No data.

Status : Modified
Published: 2017-04-25T20:59:00.430
Modified: 2024-11-21T03:33:34.667
Link: CVE-2017-8225

No data.